How to Hack Android Phone 2021 [Details]

In this blog, we will be learning about Android Hacking using a powerful framework called Metasploit.

 Android is one of the most used mobile operating systems and one of the most vulnerable ones. Android used Linux Operating System. Android is an open-source Operating System for mobile devices. Android was developed by the Open Handset Alliance, led by Google, and other companies.

Android offers a unified approach to application development for mobile devices, which means, developers need only develop for Android, and their applications should be able to run on different devices Powered by Android.

->Why Android?

Android has evolved over the years and quickly became the dominant mobile platform across the globe. It is one of the most used mobile operating systems.

Talking about stats, Android has a huge share of around 70% in the mobile market, whereas the rest 30% is shared by iOS and Windows respectively.

Android one of the most vulnerable mobile operating system, not because it's less secure, but due to the huge market, many hackers try to exploit and somehow find a loophole.

Which is more secure then Android?

-> The answer is Windows. Yes, that's true Windows OS for most mobile is most secure. The reason behind it is , the market share of Windows in the mobile industry is around 10%. And as a hacker, you won't want to waste to your time and resources for that 10% rather you will try and exploit the ones with more users. And this is the reason why Windows is most secure, because hackers don't put efforts to exploit it. 

: Can Android Be hacked ?

-> Yes.

How to Hack Android Phone?

->What is Android Hacking?

It is as simple as installing an app on your mobile phone. But what is kind of app? 

A.apk that is malicious and is created by a hacker with the motive to exploit. Once you install such an app, then Hacker gets whole control over the mobile. 

 The Android Hacking is done by Metasploit

->What is Metasploit?

How to Hack Android Phone


Metasploit is one of the most powerful exploit tools. Its comes in two versions - Commercial and Free edition. There are no major differences between the two versions.

As an Ethical Hacker, you will be using "Kali Distribution" which has the Metasploit community version embedded in it along with other ethical hacking tools.

Metasploit can be used either with the command prompt or with Web UI.

To open in Kali, 
Go to Applications -> Exploitation Tools -> Metasploit.

:- Payloads

Payloads, in simple terms, is simple scripts that the hackers utilize to interact with a hacked system. Using payloads, they can transfer data to a victim's system.

Metasploit payloads can be of three types-
  1. Singles.
  2. Staged.
  3. Stages.

:Singles-

Singles are very small and designed to create some kind of communication, then move to the next stage. For Example, Just creating a users.

:Staged-

 It is a payload that an attacker can use to upload a bigger file onto a victim's system.

:Stages-

Stages are payload components that are downloaded by Stager's modules. The various payload stages provide advanced features with no size limits, such as Meterpreter and VNC Injection.

"In the next blog, we will see how we can use this Metasploit framework and exploit an Android Device. " 


Comments

  1. Excellent Work
    A best knowledge which is provided by you in easy and simple words and methods.


    Keep It Up Well done

    ReplyDelete

Post a Comment

If you have any question . So Please comment.